Java程序辅导

C C++ Java Python Processing编程在线培训 程序编写 软件开发 视频讲解

客服在线QQ:2653320439 微信:ittutor Email:itutor@qq.com
wx: cjtutor
QQ: 2653320439
Cryptography and Security (COMP90043) — The University of Melbourne Handbook Handbook home Search the Handbook Courses Undergraduate courses Graduate courses Research courses Subjects Undergraduate subjects Graduate subjects Research subjects Breadth Tracks CAPS Login - Staff only Handbook Subjects Cryptography and Security Cryptography and Security (COMP90043) Graduate courseworkPoints: 12.5On Campus (Parkville) You’re viewing the 2021 Handbook: 20212020201920182017Or view archived Handbooks In First Half Year 2021, there will be three delivery modes for your subjects – Dual-Delivery, Online and On Campus. Please refer to the return to campus page for more information on these delivery modes and students who can enrol in each mode based on their location in first half year 2021. View full page About this subject Overview Eligibility and requirements Assessment Dates and times Further information Timetable(opens in new window) Contact information Please refer to the specific study period for contact information. Overview Availability Semester 2 Fees Look up fees AIMS The subject will explore foundational knowledge in the area of cryptography and information security. The overall aim is to gain an understanding of fundamental cryptographic concepts like encryption and signatures and use it to build and analyse security in computers, communications and networks. This subject covers fundamental concepts in information security on the basis of methods of modern cryptography, including encryption, signatures and hash functions. This subject is an elective subject in the Master of Engineering (Software). It can also be taken as an advanced elective in Master of Information Technology. INDICATIVE CONTENT The subject will be made up of three parts: Cryptography: the essentials of public and private key cryptography, stream ciphers, digital signatures and cryptographic hash functions Access Control: the essential elements of authentication and authorization; and Secure Protocols; which are obtained through cryptographic techniques. A particular emphasis will be placed on real-life protocols such as Secure Socket Layer (SSL) and Kerberos. Topics drawn from: Symmetric key crypto systems Public key cryptosystems Hash functions Authentication Secret sharing Protocols Key Management. Intended learning outcomes INTENDED LEARNING OUTCOMES (ILO)   On completion of this subject the student is expected to:   Identify security issues and objectives in computer systems and networks Apply various security mechanisms derived from cryptography to computers and computer networks Explain the workings of fundamental public key and symmetric key cryptographic algorithms including RSA, ElGamal, Diffie-Hellman schemes and stream ciphers Explain the protocols which ensure security in contemporary networked computer systems Describe the interaction between the underlying theory and working computer security infrastructure Analyse security of network protocols and systems Generic skills On completion of this subject, students should have the following skills: Ability to undertake problem identification, formulation, and solution. Ability to utilise a systems approach to solving complex problems and to design for operational performance Ability to manage information and documentation Capacity for creativity and innovation Ability to communicate effectively, with the engineering team and with the community at large. Next: Eligibility and requirements Last updated: 8 January 2021